EP2942733A1 - Architecture de sécurité de plate-forme dédiée à l'aide d'un dispositif de sécurité pour l'interaction de l'utilisateur - Google Patents
Architecture de sécurité de plate-forme dédiée à l'aide d'un dispositif de sécurité pour l'interaction de l'utilisateur Download PDFInfo
- Publication number
- EP2942733A1 EP2942733A1 EP14176506.5A EP14176506A EP2942733A1 EP 2942733 A1 EP2942733 A1 EP 2942733A1 EP 14176506 A EP14176506 A EP 14176506A EP 2942733 A1 EP2942733 A1 EP 2942733A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- data
- security device
- input
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 230000003993 interaction Effects 0.000 title abstract description 8
- 238000012545 processing Methods 0.000 claims abstract description 190
- 238000000034 method Methods 0.000 claims description 50
- 230000008569 process Effects 0.000 claims description 25
- 230000011664 signaling Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 12
- 230000008878 coupling Effects 0.000 claims description 10
- 238000010168 coupling process Methods 0.000 claims description 10
- 238000005859 coupling reaction Methods 0.000 claims description 10
- 238000012544 monitoring process Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 5
- 230000001133 acceleration Effects 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000002618 waking effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- the present invention relates to the field of data processing platforms, in particular data processing platforms which are capable of performing security critical tasks.
- a data processing platform comprising: a processing device; a security device communicatively coupled with the processing device, the security device being adapted for (i) receiving input data; and (ii) providing the input data to the processing device only if the input data are associated with a predetermined security level range (e.g. if the input data are considered by the security device to have a security level in the predetermined security level range).
- the security device is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a security device is provided, the security device being adapted for communicative coupling with a processing device, the security device being further adapted for: receiving input data; and providing the input data to the processing device only if the input data are associated with a predetermined security level range.
- the security device is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a processing device adapted for communicative coupling with a security device
- the processing device being further adapted for: providing to the security device (102) at least one of the following: (i) a trigger signal (130) for triggering execution of a secure process on the security device; and (ii) output data including an information element indicating to the security device that the output data include an input request.
- the processing device is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a method of operating a security device in a data processing platform comprising the security device and a processing device, the method comprising: receiving input data (e.g. by the security device); and providing the input data to the processing device only if the input data are associated with a predetermined security level range.
- the method is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a method of operating a processing device in a data processing platform comprising the processing device and a security device, the method comprising providing to the security device (102) at least one of the following: (i) a trigger signal (130) for triggering execution of a secure process on the security device; and (ii) output data including an information element indicating to the security device that the output data include an input request.
- the method is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a computer program product in the form of a program element or a computer readable medium comprising the program element is provided, the program element being adapted for carrying out the method according to the fourth aspect (or one or more embodiments thereof) when executed on a processor assembly.
- the computer program product is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a computer program product in the form of a program element or a computer readable medium comprising the program element is provided, the program element being adapted for carrying out the method according to the fifth aspect (or one or more embodiments thereof) when executed on a processor assembly.
- the computer program product is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first to the sixth aspect.
- a dedicated security device e.g. a security hub
- the security device provides the input data to the processing device only if the input data correspond to a predetermined security level, e.g. if the input data are low security data.
- processing device there may be one or more further processing devices.
- Processing devices in the sense of the herein disclosed subject matter may be e.g. a main processor, a secure element, a subscriber identity module (SIM), a baseband processor, etc, or in a more general wording, an internal processing device (i.e. a device included in the data processing platform).
- a processing device in the sense of the herein disclosed subject matter e.g. at least one of the further processing devices
- may be an external processing device i.e. a device not included in the data processing platform
- the processing device is an internal processing device and the further processing device may be an internal processing device or an external processing device.
- the security device is adapted to provide a higher security level than the processing devices communicatively coupled thereto.
- a higher security level may correspond to higher restrictions for installing computer program elements.
- computer program elements may be stored on a read-only storage device.
- Determining the security level of the input data may be performed in various ways, some of which are exemplarily described herein.
- the security device is further adapted for controlling outputting of an input request, the input request defining an input security level of the input data; and the security device is further adapted to not provide the input data to the processing device depending on the input security level.
- the input request may be a request for inputting credentials such as user login name and password or a pin code.
- the input data are data which are provided by a user in response to the input request.
- the security device is adapted to derive the input security level of the input data from the input request. As mentioned above, the input data are considered to be associated with the predetermined security level range if the security level of the input data is within the predetermined security level range.
- the security device is further adapted for providing the input data to the processing device only if the input security level is within the predetermined security level range. According to a further embodiment, the security device is further adapted for not providing the input data to the processing device if the input security level is outside the predetermined security level range.
- the data processing platform comprises an output device, the output device being communicatively coupled to the security device.
- the output device is a display device (e.g. a screen, one or more light sources such as emitting diodes (LEDs)), an acoustic device (e.g. a loudspeaker), a haptic device (e.g. a vibration device), etc.
- the output device is itself a processing device, e.g. the processing device or a further processing device as disclosed herein.
- the security device is adapted for providing output data to the output device.
- the security device is further adapted for monitoring the output data provided to the output device, e.g.
- the output data provided to the output device are routed through the security device.
- the security device is adapted for receiving the output data (which may be authenticated output data) and forwarding the output data to the output device.
- the processing device e.g. all processing devices of the data processing platform
- the output data can be authenticated with any known method such as Message Authentication Code (MAC) or Cryptographic Signature.
- the (authenticated) output data may be received through the processing device (e.g. a main processor or a baseband processor) from an external server or storage device.
- the processing device e.g. a main processor or a baseband processor
- the processing device is a first processing device and the security device is further adapted for providing the input data to a second processing device if the input security level is outside the predetermined security level range.
- the second processing device to which the input data are provided in this case may be identified by the input request.
- the input request may have associated therewith the identity of the second processing device.
- the security device is adapted for processing the input data itself.
- the processing device is further adapted for providing the output data to the security device.
- the security device is further adapted for forwarding the output data to the output device.
- the output data is display data rendered under control of the processing device.
- the output data may be display data rendered by the processing device. In this way, the processing load imposed on the security device may be kept low since the display data are rendered by the processing device and the security device only has to forward the display data.
- the output data may include an information element indicating to the security device that the output data include an input request.
- the information element defines the input security level.
- the security device further comprises a storage having stored therein the output data (e.g. in the form of the predetermined output data).
- the security device may be further adapted for forwarding the predetermined output data to the output device, e.g. upon a trigger signal from the processing device.
- the processing device may provide to the security device a trigger signal indicating "authenticate user" and the security device may select from the storage the predetermined output data associated with the trigger signal. This may be performed by any suitable means, e.g. a lookup table.
- the security device may provide the predetermined output data to the output device, which for example may ask the user for inputting her or his credentials.
- the trigger signal may define the input security level.
- the output data as disclosed herein are the trigger signal.
- the data processing platform further comprises a signaling device, the signaling device being communicatively coupled to the security device and the security device being adapted for controlling the signaling device so as to indicate the input security level to the user.
- the signaling device may be adapted to provide a signal (e.g. optical signal or acoustical signal) if the input security level is defined (e.g. by the input request, by the output data, by the information element, etc.) as being outside the predetermined security level range.
- the signaling device may indicate to a user that the input data provided by the user while the signal is on is securely handled by the security device (e.g. is not forwarded to the processing device).
- the security device is further adapted for receiving a trigger signal from the processing device, and in response to the trigger signal, executing a a secure process (e.g. a respective software component - however, the process may also be implemented in hardware) on the security device, the secure process processing the input data without providing the input data to the processing device.
- the secure process may be an encryption process, a payment process, the generation of a hash code, pin verification, etc.
- the security device provides, in the response to the trigger signal and after executing the secure process, a return signal, e.g. an output of the secure process (e.g. the hash code, encrypted credentials, unlocking of a device (e.g. unlocking of the data processing platform), etc.).
- the security device comprises a storage for storing the software component, the storage being communicatively coupled exclusively to the security device (i.e. is not accessible by an external component located outside the security device).
- the security device is adapted for selectively taking one of a secure operating mode and a non-secure operating mode; the security device being further adapted for providing the input data to the processing device depending on whether the input data are associated with the predetermined security level range if the security device is in the secure operating mode; and the security device being adapted for providing the input data to the processing device independent of the input data (and/or the output data) if the security device is in the non-secure operating mode (e.g. in the non-secure operating mode any input data is considered by the security device to have a security level inside the predetermined security level range).
- in the secure operating mode any input data is considered by the security device to have a security level outside the predetermined security level range.
- the security device is adapted to consider any input data to have a security level outside the predetermined security level range.
- the security device is configured for accepting only authenticated output data from the processing device if the security device is in the secure operating mode.
- the security device is adapted for monitoring interaction (e.g. a user interaction) with the processing device and/or with at least one further processing device (e.g. a SIM and/or a secure element) and optionally the processing device and/or at least one of the further processing devices are adapted for providing to the security device a subsequent trigger signal to enable the secure operating mode.
- at least one further processing device e.g. a SIM and/or a secure element
- the processing device and/or at least one of the further processing devices are adapted for providing to the security device a subsequent trigger signal to enable the secure operating mode.
- the security device is adapted to take (e.g. to switch to) the secure operating mode depending on the data monitored by the security device (e.g. monitored interaction with the processing device, monitored output data, etc).
- a processing device as disclosed herein comprises a processor assembly having at least one main processor and at least one graphics processor.
- the display data may be rendered by the at least one graphics processor under control of the at least one main processor.
- the security device is communicatively coupled to an input device, e.g. two or more input devices.
- an input device in the sense of the herein disclosed subject matter is a user interface (e.g.
- the input device is itself a processing device, e.g. the processing device or a further processing device as disclosed herein.
- the input data are received from the input device.
- the security device may be communicatively coupled to at least one further input device.
- the security device may be communicatively coupled to one or more input devices, e.g. to all input devices or selective ones of the input devices of the data processing platform.
- the security device is a security hub.
- the security device is adapted for considering all input data which are received from an input device as not being associated with the predetermined security level range. According to an embodiment security device is adapted for considering, status data, and in particular status data generated by the security device, as being associated with the predetermined security level range.
- the security device is communicatively coupled to the output device as described herein. According to a further embodiment, the security device is communicatively coupled to at least one further output device. Generally speaking, the security device may be communicatively coupled to one or more output devices, e.g. to all output devices of the data processing platform. According to an embodiment, the security device is a dedicated device for handling all user interaction. According to an embodiment, the data processing platform is a data processing apparatus.
- the computer program element as disclosed herein may be implemented as computer readable instruction code by use of any suitable programming language, such as, for example, JAVA, C++, and may be stored on a computer-readable medium (removable disk, volatile or non-volatile memory, embedded memory/processor, etc.).
- the instruction code is operable to program a computer or any other programmable device to carry out the intended functions.
- the computer program may be available from a network, such as the World Wide Web, from which it may be downloaded.
- the herein disclosed subject matter or part thereof may be realized by means of a computer program respectively software. However, the herein disclosed subject matter may also be realized by means of one or more specific electronic circuits respectively hardware. Furthermore, the herein disclosed subject matter may also be realized in a hybrid form, i.e. in a combination of software modules and hardware modules.
- the security device may be provided in software, in particular running in a virtual machine which itself is running on the processing device. According to another embodiment, the security device may be a hardware device, or a software component which is running on hardware dedicated to the security device.
- Figure 1 shows a data processing platform according to embodiments of the herein disclosed subject matter.
- the data processing platform 100 comprises a security device 102. Further, in accordance with an embodiment the platform 100 comprises one or more input devices 104, e.g. two input devices 104 as shown in Fig. 1 , which are communicatively coupled to the security device 102.
- the input devices 104 may include for example one or more of a touchscreen, a keyboard, a switch, a keypad, a activation button, a microphone, a camera, an acceleration sensor, a temperature sensor, an global positioning system (GPS) sensor, a compass, a relative humidity sensor, a pressure sensor, an infrared sensor, a fingerprint scanner, an iris scanner, microphone, accelerometer, camera, etc.
- GPS global positioning system
- the data processing platform 100 further comprises one or more output devices 106 e.g. two output devices 106 as shown in Fig. 1 .
- the output devices 106 may include for example one or more of a touchscreen, an electrooptic transducer such as a light emitting diode (LED), an electroacoustic transducer such as a loudspeaker, etc.
- the data processing platform 100 may comprise a combined input output device, such as the touchscreen mentioned above, which is capable of providing the functionality of an input device 104 and the functionality of the output device 106.
- one or more of the output devices 106 may act as the signaling device according to embodiments of the herein disclosed subject matter, wherein the security device 102 is adapted for controlling the signaling device so as to indicate the input security level, i.e. the security level defined for the input data, to the user.
- the security device 102 is adapted for controlling the signaling device so as to indicate the input security level, i.e. the security level defined for the input data, to the user.
- a dedicated signaling device is provided, the sole purpose of which is to indicate the input security level to the user.
- the security device 102 is communicatively coupled to one or more processing devices 108, e.g. to a single processing device 108, as shown in Fig. 1 .
- the processing device 108 may include a processor assembly 111 having one or more main processors 110, e.g. two main processors 110 as shown in Fig. 1 .
- the processor assembly 111 may include one or more graphics processors 112, e.g. one graphics processor 112.
- the processor assembly may include one or more baseband processors (which processes e.g. GSM, 2G, 3G, 4G (as defined in the third generation partnership project (3GPP), GPS, or other (wireless or wired) communication interfaces. Communicative coupling is indicated at 114 in Fig. 1 .
- the security device 102 itself includes a processor assembly having, for example, one or more main processors and optionally one or more graphics processors. However, from an energy consumption perspective it may be advantageous to omit graphics processors in the security device 102. Nevertheless, in accordance with an embodiment, the functionality of the security device 102 as described herein is provided by one or more program elements which provide the described functionality when executed on a processor assembly.
- the security device 102 at least in normal operation (non-secure operating mode), forwards data received from the input devices 104 (input data, exemplarily indicated at 116) to the processing device 108.
- the security device for words data are received from the processing device 108 (e.g. output data, exemplarily indicated at 118) to the output devices 106. Routing of data to the respective devices is performed according to known methods.
- the input data are provided to the processing device 108 only if the input data are associated with a predetermined security level range, e.g. if the security device is in a non-secure operating mode.
- the security device 102 may be adapted for automatically switching between the non-secure operating mode and a secure operating mode depending on operating conditions. Such operating conditions may include for example outputting often input request, the input request requesting the input in of confidential data by a user.
- there may be provided a switch 120 allowing the user to manually switch between the secure operating mode and the non-secure operating mode.
- the switch 120 may be provided as a software switch or as a hardware switch. Preferably the switch 120 is exclusively coupled with or controlled by the security device 102.
- a first entity of the data processing platform (e.g. the processing device or a further processing device) is adapted for initiating the secure operating mode.
- a second entity of the data processing platform (e.g. the processing device or a further processing device) is adapted for initiating the non-secure operating mode.
- the first entity and the second entity may be a hardware element or a software element.
- the second entity is the first entity, i.e. the functionality of the first entity and the second entity is implemented by the same, single element.
- the first entity and the second entity are different elements.
- a practical application (example) of embodiments of the herein disclosed subject matter is a financial transaction handled by a Secure Element (SE):
- SE Secure Element
- a main processor may be adapted for initiating a transaction with the SE through the security device in the form of a security HUB. This may trigger the secure operating mode or, in another embodiment, the SE may be adapted for subsequently triggering the secure operating mode.
- the security HUB cuts of the main processor from all input data, and the pin entry data is sent to the SE.
- the SE signals the security HUB it can leave the secure state.
- the main processor first entity
- the SE second entity
- the communicative coupling (indicated at 114 in Fig. 1 ) of the respective entities is preferably performed by known means, e.g. a touchscreen may be connected to the security device 102 by electrical conductors and by using common protocols for the communication.
- communicative coupling may be of any suitable type and any such type can be employed with embodiments of the herein disclosed subject matter as long as the communicative coupling provides the necessary functionality to implement embodiments of the herein disclosed subject matter.
- Fig. 2 shows a further data processing platform 200 according to embodiments of the herein disclosed subject matter.
- the data processing platform 200 comprises a security device 102, a processing device 108 and a combined input output device 104, 106 in the form of touchscreen. Communicative coupling is again indicated at 114.
- the security device 102 is implemented on a processor assembly 111 on which there is implemented also a sensor hub 124.
- the sensor hub 124 is communicatively coupled with the one or more sensors indicated at 126 in Fig. 2 .
- the processor assembly 111 on which there is implemented the sensor hub 124 has the advantage that the functionality of the security device 102 can easily be implemented on an existing platform which already comprises a sensor hub 124.
- the security device is implemented as running in a virtual machine which itself is running on the processor assembly 111.
- the data processing platform 200 comprises a secure element 128 which is communicatively coupled or communicatively coupleable with the security device 102.
- the secure element 128 include security relevant data such as the cryptographic key and/or may provide a security relevant service.
- the security device 102 is adapted for communicating with the secure element 128 if this is necessary for the security device 102 to have the secure element perform one or more embodiments of the herein disclosed subject matter, e.g. an encryption of credentials of a user.
- Fig. 3 illustrates the communication of entities of a data processing platform according to embodiments of the herein disclosed subject matter.
- the processing device 108 (or an application running thereon) provides a trigger signal 130, e.g. in the form of a security request, to the security device 102.
- the security device switches to a secure operating mode, indicated at 132.
- the security device 102 in response to switching to the secure operating mode, provides a control signal 133 to the signaling device 109 in order to signal to the user that the security device is in the secure operating mode.
- the security device 102 provides a retrieve request 134 to a storage device 136, the retrieve request 134 requesting the storage device 136 to provide output data 118 to the security device 102.
- the security device 102 forwards the output data 118 to the output device 106, the output data being done input request requesting a user to input the input data 116 (e.g. credentials) into the input device 104.
- the input data 116 are forwarded to the security device 102.
- the security device 102 performs actions (not shown in Fig. 3 ) associated with the trigger signal 130.
- the process 140 associated with the trigger signal 130 and defining these actions may be predefined and stored in a storage of the security device, e.g. in the storage 136. Respective communications between the security device 102 and the storage 136 are not shown in Fig. 3 .
- the process 140 is a payment process.
- the process 140 defined by the trigger signal 130 is free of any communication with the processing device 108, thereby ensuring that the input data 116 (e.g. received by the security device 102 from the input device 104) is not provided to the processing device 108.
- the process 140 is performed at least partially in a secure element (as described herein) communicatively coupled to the security device 102.
- the security device 102 checks (indicated at 142) as to whether the input data 116 are associated with the predetermined security level range, e.g. as to whether the security device is in the non-secure operating mode. Since in the described example the security device is in the secure operating mode (see 132), in accordance with an embodiment in the described situation the security device 102 will not provide the input data 116 to the processing device 108.
- the security check 142 may occur at any suitable time which of course it may depend on the process 140 to be performed by the security device 102 in response to the trigger signal 130.
- the security device 102 after finishing the process 140 the security device 102 provides a control signal 144 to the signaling device 109 to thereby operate the signaling device so as to indicate to the user that the security device 102 does no longer control the inputs to the input device 104.
- the security device 102 may provide to the processing device 108 a feedback signal 146 indicating as to whether that the process 140 requested by the trigger signal 130 has been performed successfully by the security device 102.
- the security device may switch into an non-secure mode (as described herein), indicated at 135 in Fig. 3 .
- Fig. 4 illustrates the communication of entities of a data processing platform according to embodiments of the herein disclosed subject matter.
- the security device 102 is adapted for monitoring (indicated at 150 in Fig. 4 ) the output data 118 provided to the output device 106, which according to an embodiment are rendered by the processing device 108 and provided to the security device 102.
- monitoring 150 may allow the security device 102 to decide as to whether the security device 102 has to adopt the secure operating mode or not.
- the processing device 108 is adapted for including in the output data 118 an information element 148 indicating the security level of the output data 118.
- the security level of the output data 118 defines the security level of input data 116 which are received by the security device 102 (e.g.
- the security level of the input data 116 may be defined as to be the same as the security level of the output data 118.
- the security device 102 is adapted to switch into the secure operating mode depending on the security level of the input data 116.
- the security device 102 is adapted for checking as to whether the security level of the input data 116 is within the predetermined security level range and forwarding the input data 116 to the processing device 108 only if the security level of the input data 116 is within the predetermined security level range.
- the information element 148 may also identify a process 140 the security device has to perform with in response to outputting the output data 118.
- the process 140 may include receiving the input data 116, as is shown in Fig. 4 .
- the further actions and communications performed by security device 102 in response to receiving the input data 116 may be the same as described with regard to Fig. 3 .
- Fig. 5 shows a data processing platform 300 according to embodiments of the herein disclosed subject matter.
- the data processing platform 300 is a user device, such as a mobile phone.
- the data processing platform 300 comprises a plurality of processing devices 108, 208, 308, 408, e.g. a main processor 108, a baseband processor 208, a secure element 308, and a subscriber identity module (SIM) 408.
- the processing devices 108, 208, 308 and 408 are communicatively coupled (indicated at 114) with a security device 102 in the form of a security hub. Two or more processing device may be communicatively coupled to each other (e.g. the main processor 108 and the baseband processor 208).
- Further communicatively coupled to the security device 102 are one or more input devices in the form of human interface input devices, one of which is shown at 104 in fig. 5 . Further communicatively coupled to the security device 102 are a one or more output devices in the form of human interface output devices, one of which is shown at 106 in fig. 5 . In accordance with an embodiment, further communicatively coupled with the security device 102 is human interface input-output device.
- the main processor is adapted for triggering a monitoring of selected input channels of the user device 300 wherein each input channel may be established on communicative coupling 114 of a respective one of the human interface input device(s) 104 with the security device 102.
- the main processor is putting itself in a sleep state after triggering the monitoring of the selected input channels.
- triggering monitoring of the selected input channels also triggers switching of the security device 102 into a secure operating mode.
- the selected input channels (or the corresponding human interface input devices 104) will be monitored by the security device 102.
- a human interface input device 104 may be e.g. a touch screen, a keypad, a button, a microphone, a camera, an acceleration sensor, a temperature sensor, a global positioning system (GPS) sensor, a compass, a relative humidity sensor, a pressure sensor, an infrared sensor, a fingerprint scanner, an iris scanner, etc.
- GPS global positioning system
- compass a relative humidity sensor
- a pressure sensor an infrared sensor
- a fingerprint scanner an iris scanner
- a microphone, buttons and a touch screen of the user device 300 are monitored. Monitoring the microphone may allow for providing input data which are based on a speech input.
- the security device 102 is adapted for requesting a PIN upon detection of a valid signal (valid input data) on at least one of the selected input channels (or the corresponding human interface input devices 104).
- requesting a PIN corresponds to outputting a respective input request by the security device 102, e.g. by outputting the input request to an appropriate one of the human interface output devices 106.
- a human interface output device 106 may be e.g. a display device (e.g. a screen, one or more light sources such as emitting diodes (LEDs)), an acoustic device (e.g. a loudspeaker), a haptic device (e.g. a vibration device), etc.
- the touch screen is a human interface I/O device providing the functionality of a human interface input device 104 and a human interface output device 106 in a single device.
- the security device 102 since the security device 102 is in the secure operating mode, the security device 102 is adapted to not provide to the main processing device 108 any input data (i.e. the PIN) which the security device 102 receives in response to the input request from one of the human interface input devices 104.
- the security device 102 is adapted for verifying the input data (i.e. the PIN) for correctness. In accordance with a further embodiment, the security device 102 is adapted for waking up the main processor 108 and optionally for providing to the main processor a status message that the input data have been correctly entered, if the security device 102 determines that the input data is correct. In accordance with an embodiment, the security device 102 is adapted for switching into non-secure operating mode after waking up the main processor 108 (and, optionally, providing the status message).
- the security device 102 is adapted for unlocking a SIM card communicatively coupled with the SIM 408.
- the security device 102 is adapted for requesting (spontaneously or when triggered by the main processor 108) inputting of a SIM PIN code, i.e. for outputting of an input request requesting the SIM PIN code.
- the security device 102 is further adapted for sending the SIM PIN code directly to the SIM 408 without providing the SIM PIN code to the main processor 108.
- the input request defines the SIM PIN code not being associated with the predetermined secure security level range as described herein.
- the main processor 108 forms "the processing device" in the sense of the herein disclosed subject matter, i.e. the processing device to which the input data (SIM PIN code) is provided only if the input data is associated with a predetermined security level range.
- the processing devices 208, 308, 408 may be considered as further processing devices in the sense of the herein disclosed subject matter, at least with regard to the use case related to inputting of the SIM PIN code.
- a device or an assembly as disclosed herein is not limited to dedicated entities as described in some embodiments. Rather, the herein disclosed subject matter may be implemented in various ways while still providing the specified functionality.
- any suitable entity e.g. components, and devices
- the security device are at least in part provided in the form of respective computer programs which enable a processor assembly to provide the functionality of the respective entities as disclosed herein.
- any suitable entity disclosed herein may be provided in hardware.
- some entities may be provided in software while other entities are provided in hardware.
- any entity disclosed herein e.g. components and devices
- the herein disclosed subject matter may be implemented in various ways and with various granularity on device level or software module level while still providing the specified functionality.
- a separate entity e.g. a software module, a hardware module or a hybrid module (combined software/hardware module)
- an entity e.g. a software module, a hardware module or a hybrid module
- two or more entities e.g. components or device
- an architecture for a data processing platform using a dedicated security device for user interaction comprising: a processing device; a security device communicatively coupled with the processing device, the security device being adapted for receiving input data and providing the input data to the processing device only if the input data are associated with a predetermined security level range, e.g. if the processing device is in a secure operating mode or if input data are considered by the security device to have a security level in the predetermined security level range.
- the security level of the input data may be defined for example
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Alarm Systems (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14176506.5A EP2942733A1 (fr) | 2014-05-09 | 2014-07-10 | Architecture de sécurité de plate-forme dédiée à l'aide d'un dispositif de sécurité pour l'interaction de l'utilisateur |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14167792 | 2014-05-09 | ||
EP14176506.5A EP2942733A1 (fr) | 2014-05-09 | 2014-07-10 | Architecture de sécurité de plate-forme dédiée à l'aide d'un dispositif de sécurité pour l'interaction de l'utilisateur |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2942733A1 true EP2942733A1 (fr) | 2015-11-11 |
Family
ID=50721594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14176506.5A Ceased EP2942733A1 (fr) | 2014-05-09 | 2014-07-10 | Architecture de sécurité de plate-forme dédiée à l'aide d'un dispositif de sécurité pour l'interaction de l'utilisateur |
Country Status (3)
Country | Link |
---|---|
US (1) | US20150326558A1 (fr) |
EP (1) | EP2942733A1 (fr) |
CN (1) | CN105095773A (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3312759A1 (fr) * | 2016-10-21 | 2018-04-25 | Samsung Electronics Co., Ltd. | Élément sécurisé (soi), procédé d'exploitation du soi et dispositif électronique comprenant le soi |
EP3384446A4 (fr) * | 2015-11-30 | 2018-12-19 | Simsec Hong Kong Limited | Système et dispositif mobile de système de paiement multiple |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2574628B (en) * | 2018-06-13 | 2020-12-09 | Arm Ip Ltd | Attestation of processing |
US10866622B1 (en) * | 2018-12-11 | 2020-12-15 | Government of the United States as represented by Director National Security Agency | Device for securing a charge operation of an end-user device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092202A (en) * | 1998-05-22 | 2000-07-18 | N*Able Technologies, Inc. | Method and system for secure transactions in a computer system |
EP2713304A1 (fr) * | 2012-10-01 | 2014-04-02 | Nxp B.V. | Authentification d'utilisateur sécurisée au moyen d'un élément sécurisé maître |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5615263A (en) * | 1995-01-06 | 1997-03-25 | Vlsi Technology, Inc. | Dual purpose security architecture with protected internal operating system |
FR2804234B1 (fr) * | 2000-01-24 | 2003-05-09 | Gemplus Card Int | Procede de protection contre le vol de la valeur d'authentification pour cartes a puce(s) multi-applications, cartes a puce(s) mettant en oeuvre le procede et terminaux susceptibles de recevoir lesdites cartes |
US7152244B2 (en) * | 2002-12-31 | 2006-12-19 | American Online, Inc. | Techniques for detecting and preventing unintentional disclosures of sensitive data |
US7774824B2 (en) * | 2004-06-09 | 2010-08-10 | Intel Corporation | Multifactor device authentication |
US7890612B2 (en) * | 2006-05-08 | 2011-02-15 | Electro Guard Corp. | Method and apparatus for regulating data flow between a communications device and a network |
US7971241B2 (en) * | 2006-12-22 | 2011-06-28 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for providing verifiable security in storage devices |
US8108932B2 (en) * | 2008-06-12 | 2012-01-31 | International Business Machines Corporation | Calculating a password strength score based upon character proximity and relative position upon an input device |
CN110096253B (zh) * | 2013-07-11 | 2022-08-30 | 英特尔公司 | 利用相同的音频输入的设备唤醒和说话者验证 |
-
2014
- 2014-07-10 EP EP14176506.5A patent/EP2942733A1/fr not_active Ceased
-
2015
- 2015-05-08 CN CN201510232497.4A patent/CN105095773A/zh active Pending
- 2015-05-08 US US14/708,107 patent/US20150326558A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092202A (en) * | 1998-05-22 | 2000-07-18 | N*Able Technologies, Inc. | Method and system for secure transactions in a computer system |
EP2713304A1 (fr) * | 2012-10-01 | 2014-04-02 | Nxp B.V. | Authentification d'utilisateur sécurisée au moyen d'un élément sécurisé maître |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3384446A4 (fr) * | 2015-11-30 | 2018-12-19 | Simsec Hong Kong Limited | Système et dispositif mobile de système de paiement multiple |
EP3312759A1 (fr) * | 2016-10-21 | 2018-04-25 | Samsung Electronics Co., Ltd. | Élément sécurisé (soi), procédé d'exploitation du soi et dispositif électronique comprenant le soi |
Also Published As
Publication number | Publication date |
---|---|
CN105095773A (zh) | 2015-11-25 |
US20150326558A1 (en) | 2015-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6799541B2 (ja) | モバイル機器におけるユーザ認証及び人間の意図検証のための方法及び装置 | |
CN110399713B (zh) | 一种信息认证的方法及相关装置 | |
EP3057053B1 (fr) | Dispositif électronique et procédé de traitement d'informations sécurisées | |
CN108920366B (zh) | 一种子应用调试方法、装置及系统 | |
KR20180061311A (ko) | 서비스 처리 방법, 기기 및 시스템 | |
US20160239686A1 (en) | Storing and using data with secure circuitry | |
KR102315262B1 (ko) | 사용자 인증 시스템에서 이용되는 방법 및 사용자 인증 시스템에 포함된 정보 처리 장치 | |
US20170148029A1 (en) | Payment verification system, method and apparatus | |
US20130007876A1 (en) | System and method of providing biometric quick launch | |
CN107483213B (zh) | 一种安全认证的方法、相关装置及系统 | |
US10216915B2 (en) | Authentication method and apparatus thereof | |
CN105468952A (zh) | 身份验证方法及装置 | |
CN108475304B (zh) | 一种关联应用程序和生物特征的方法、装置以及移动终端 | |
WO2015057466A1 (fr) | Modification sécurisée à distance de justificatifs de dispositifs à l'aide de justificatifs générés par les dispositifs | |
KR101642019B1 (ko) | 단말기 검증방법, 장치, 프로그램 및 기록매체 | |
KR102616421B1 (ko) | 생체 인증을 이용한 결제 방법 및 그 전자 장치 | |
KR102124445B1 (ko) | 애플리케이션의 로그인 패스워드를 입력하기 위한 방법, 디바이스 및 단말기 | |
US20150326558A1 (en) | Architecture for platform security using a dedicated security device for user interaction | |
EP3407278A1 (fr) | Procédé et appareil pour signaler la perte d'une carte ou d'un dispositif associé à un numéro de compte ou le vol d'un numéro de compte | |
US11936649B2 (en) | Multi-factor authentication | |
CN109815666B (zh) | 基于fido协议的身份认证方法、装置、存储介质和电子设备 | |
JP2022116117A (ja) | 認証ウィンドウ表示方法及び装置 | |
EP2192519A1 (fr) | Système et procédé pour la fourniture d'un lancement biométrique rapide | |
CN106778297B (zh) | 应用程序的运行方法、装置及移动终端 | |
US10430571B2 (en) | Trusted UI authenticated by biometric sensor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17P | Request for examination filed |
Effective date: 20160511 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
17Q | First examination report despatched |
Effective date: 20180918 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20191006 |